Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(3)

Unified Diff: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/embedding_csp-header.html

Issue 2799613003: Un-skipped wpt embedded enforcement tests (Closed)
Patch Set: Created 3 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
Index: third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/embedding_csp-header.html
diff --git a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/embedding_csp-header.html b/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/embedding_csp-header.html
deleted file mode 100644
index a6698864c05f5b95b47d264a40702462ce88e659..0000000000000000000000000000000000000000
--- a/third_party/WebKit/LayoutTests/http/tests/security/contentSecurityPolicy/embeddedEnforcement/embedding_csp-header.html
+++ /dev/null
@@ -1,117 +0,0 @@
-<!DOCTYPE html>
-<html>
-<head>
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
-</head>
-<body>
- <script>
- src = '../resources/get-embedding-csp-header.php';
- new_src = '../resources/get-embedding-csp-header-and-respond.php';
- function generateRedirect(url) {
- return '/security/resources/redir.php?url=' + url;
- }
-
- async_test(t => {
- var i = document.createElement('iframe');
- i.src = src;
-
- window.addEventListener('message', t.step_func(e => {
- if (e.source != i.contentWindow)
- return;
- assert_equals(src, e.data['src']);
- assert_equals(null, e.data['embedding_csp']);
- t.done();
- }));
-
- document.body.appendChild(i);
- }, "Embedding_CSP is not sent if csp attribute is not set on <iframe>.");
-
- async_test(t => {
- var i = document.createElement('iframe');
- i.csp = "script-src 'unsafe-inline'";
- i.src = src;
-
- window.addEventListener('message', t.step_func(e => {
- if (e.source != i.contentWindow)
- return;
- assert_equals(src, e.data['src']);
- assert_equals("script-src 'unsafe-inline'", e.data['embedding_csp']);
- t.done();
- }));
-
- document.body.appendChild(i);
- }, "<iframe csp> sends an Embedding-CSP request header.");
-
- async_test(t => {
- var i = document.createElement('iframe');
- i.csp = "script-src 'unsafe-inline'";
- i.src = src;
- document.body.appendChild(i);
-
- i.onload = function() {
- i.contentWindow.location = new_src + "?csp=" + i.csp;
- window.addEventListener('message', t.step_func(e => {
- if (e.source != i.contentWindow || new_src != e.data['src'])
- return;
- assert_equals("script-src 'unsafe-inline'", e.data['embedding_csp']);
- t.done();
- }));
- }
- }, "Set Embedding-CSP Header on change of window's location.");
-
- async_test(t => {
- var i = document.createElement('iframe');
- i.csp = "script-src 'unsafe-inline'";
- i.src = src;
- document.body.appendChild(i);
-
- i.csp = "default-src 'unsafe-inline'";
- i.src = new_src + "?csp=" + i.csp;
- window.addEventListener('message', t.step_func(e => {
- if (e.source != i.contentWindow || new_src != e.data['src'])
- return;
- assert_equals("default-src 'unsafe-inline'", e.data['embedding_csp']);
- t.done();
- }));
- }, "Set Embedding-CSP Header on change of src attribute on iframe.");
-
-
- async_test(t => {
- var i = document.createElement('iframe');
- i.csp = "script-src 'unsafe-inline'";
- redirect_url = 'http://127.0.0.1:8000/security/contentSecurityPolicy/resources/get-embedding-csp-header.php';
- i.src = generateRedirect(redirect_url);
- document.body.appendChild(i);
-
- window.addEventListener('message', t.step_func(e => {
- if (e.source != i.contentWindow) {
- return;
- }
- assert_equals(src, e.data['src']);
- assert_equals("script-src 'unsafe-inline'", e.data['embedding_csp']);
- t.done();
- }));
- }, "Set Embedding-CSP Header on redirect in <iframe>.");
-
- async_test(t => {
- var i = document.createElement('iframe');
- i.csp = "script-src 'unsafe-inline'";
- redirect_url = 'http://127.0.0.1:8000/security/contentSecurityPolicy/resources/get-embedding-csp-header.php';
- i.src = generateRedirect(redirect_url);
- document.body.appendChild(i);
-
- redirect_url = 'http://127.0.0.1:8000/security/contentSecurityPolicy/resources/get-embedding-csp-header-and-respond.php';
- new_redirect = generateRedirect(redirect_url);
- i.csp = "default-src 'unsafe-inline'";
- i.src = new_redirect;
- window.addEventListener('message', t.step_func(e => {
- if (e.source != i.contentWindow || new_src != e.data['src'])
- return;
- assert_equals("default-src 'unsafe-inline'", e.data['embedding_csp']);
- t.done();
- }));
- }, "Set Embedding-CSP Header on change of csp attribte and redirect.");
- </script>
-</body>
-</html>

Powered by Google App Engine
This is Rietveld 408576698